Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Karagiannis, Stylianos
.
Systematic Design, Deployment and Evaluation of Gamified Cybersecurity Learning Environments
In
Department of Informatics
. Corfu, Greece: Ionian University, 2022.
Scott, Nicholas V.
.
A Theoretical Formulism for Evidential Reasoning and Logic Based Bias Reduction in Geo-Intelligence Processing
In
4 th International Conference on Statistics: Theory and Applications (ICSTA'22)
. Prague, Czech Republic, 2022.
Giannino, Marco
.
Money Laundering and Terrorist Financing through Cryptocurrency
. Vol. Master of Science in Financial Crimes and Compliance Management. Utica University, 2022.
Dowse, Andrew
, and
Sascha Dov Bachmann
.
"
Information warfare: methods to counter disinformation
."
Defense & Security Analysis
(2022).
Courtain, Sylvain
.
Essays on network data analysis through the bag-of-paths framework
In
Louvain Research Institute in Management and Organizations Louvain School of Management
. Vol. Doctor of Philosophy in Economics and Management Sciences. Université catholique de Louvain, 2022.
Barahona, Carolina del Rocio
.
Martens Clause: application in the context of Cyberwar
In
Facultad de Jurisprudencia
. Pontificia Universidad Católica del Ecuador, 2022.
K¨onig, Philip
,
Fabian Obermann
,
Kevin Mallinger
, and
Alexander Schatten
.
Root Cause Analysis of Software Aging in Critical Information Infrastructure
., 2022.
Lewandowsky, Stephan
, and
John Cook
.
The Conspiracy Theory Handbook
. NSC OPIR, 2020.
Deng, Xinyang
, and
Wen Jiang
.
"
A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory
."
Applied Intelligence
(2022).
Федонюк, Сергій
.
Міжнародні аспекти безпеки кіберпростор
. Вежа-Друк: Луцьк , 2022.
Tibor, Serbakov Márton
.
A szélsőséges terrorista csoportok internethasználatának elemzése
. Vol. PHD. Egyetem Pécsi Tudományegyetem, 2022.
Petrova, Valentina Markova
.
Analytical hierarchical process for assessment and selection of secure software solutions
. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022.
Rana, Abhisekh
,
Hamdi Kavak
,
Andrew Crooks
,
Sean Luke
,
Carlotta Domeniconi
, and
Jim Jones
.
Mitigation of Optimized Pharmaceutical Supply Chain Disruptions by Criminal Agents
In
International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation
., 2022.
Alkan, Erkan
.
Birleşik Krallığın dış politikasında yumuşak güç aracı olarak burs programları
. Vol. masterThesis. Batman: Batman Üniversitesi Lisansüstü Eğitim Enstitüsü, 2022.
Spasic, A. J.
,
D. S. Jankovic
,
P. J. Rajkovic
, and
D. S. Aleksic
.
"
Programme-Sensitive Modifications of Generalized Net Model of Software-Intensive Production of Stereoscopic Multimedia Content
."
Journal of Computer and Systems Sciences International
61 (2022): 824-842.
Альперт, Софія Іоган
.
"
Новітній підхід до застосування теорії дезера – смарандаке при класифікуванні емляного покриву під час проведення дистанційного зондування із використанням безпілотних літальних апаратів
."
Управління розвитком складних систем
49 (2022).
Feriz, Larisa
.
"Duboki" i "mračni" internet
In
Faculty of Humanities and Social Sciences
. University of Zagreb, 2022.
Hoyte, Trudee
,
Anil Ali
, and
Adilah Mahabir
.
"
A Preliminary Study Investigating the Impact of the COVID-19 Pandemic on Dental Education in the Caribbean: A Student’s Perspective
."
Oral
2 (2022): 251-262.
Belletti, Federico
.
Las operaciones de ciberguerra y su contribución al logro de los objetivos del nivel operacional: caso de estudio el accionar de Rusia contra Ucrania
. Argentina: Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, 2021.
Chambers, Michael David
.
Exploring the Standards Cybersecurity Practitioners Need to Comply with Multinational Cybersecurity Requirements
. Vol. Doctor of Computer Science. Colorado Technical University, 2022.
Narankotuwa, Kusal Madusanka
.
Effects on Perceived Productivity for Remote Workplace: Case Study during the COVID-19 Pandemic
In
Graduate School
. Kasetsart University, 2021.
Aferudin, Farouq
, and
Kalamullah Ramli
.
"
The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia
."
Budapest International Research and Critics Institute-Journal (BIRCI-Journal)
5, no. 3 (2022): 22859-22872.
Sharma, Muskan
.
Cyber Terrorism and How Internet is Used to Propagate it
In
Legal Readings, "A Platform for Learning"
., 2021.
Hazari, Sunil
.
"
Investigation of generational differences in advertising behaviour and fake news perception among Facebook users
."
Int. J. Internet Marketing and Advertising
17, no. 1/2 (2022).
Poškus, Armandas
.
Kibernetinio saugumo galimybių tyrimas
. Vol. Bakalauro. Vilnius: Generolo Jono Žemaičio Lietuvos karo akademija, 2022.
Pages
« първа
‹ предишна
…
509
510
511
512
513
514
515
516
517
…
следваща ›
последна »
472639 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance